2011
DOI: 10.1007/978-3-642-25141-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Pairings Based on Elliptic Nets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0
2

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 15 publications
0
6
0
2
Order By: Relevance
“…Ogura et al [7] gave explicit formulae based on elliptic nets for computing some variants of the Tate pairing, which contained the optimal ate pairing. We use the following:…”
Section: The Optimal Ate Pairing Via Elliptic Netsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ogura et al [7] gave explicit formulae based on elliptic nets for computing some variants of the Tate pairing, which contained the optimal ate pairing. We use the following:…”
Section: The Optimal Ate Pairing Via Elliptic Netsmentioning
confidence: 99%
“…2. ) This extension of the block allows us to compute Double or DoubleAdd without the recurrences (6) and (7). Although this technique increases the total cost, the cost of the critical path is reduced to the following three operations; one multiplication in F p 12 , one multiplication of the elements in F p 12 and F p 2 , and one addition in F p 12 .…”
Section: Outline Of Our Parallelizationmentioning
confidence: 99%
“…Ogura et al [11] provided formulas for using elliptic nets to find cryptographic pairings. In this paper, we review only the formula for the Ate pairing.…”
Section: Using An Elliptic Net To Find An Ate Pairingmentioning
confidence: 99%
“…In 2007, Stange [10] defined elliptic nets and proposed an alternative method based on elliptic nets for computing Tate pairings. Ogura et al [11] presented formulas that use elliptic nets to compute cryptographic pairings.…”
Section: Introductionmentioning
confidence: 99%
“…During her talk at Microsoft Research on January 30, 2007, she has described the various applications of elliptic nets in cryptography [10]. Since then, the higher-ranked elliptic nets on Weierstrass curves have been applied in the computation of Tate and r − Ate pairings [6]. Years later, the same theory of elliptic nets which employed polynomials has been applied in the calculation of scalar multiplications [2,5,12]; this is the primary goal and interest in this current paper.…”
Section: Introductionmentioning
confidence: 99%